From 08fe76be1af77351bfd7c650ac5fd1a05e2d7f42 Mon Sep 17 00:00:00 2001 From: Edward Rosen <31105434+edwardrosen@users.noreply.github.com> Date: Thu, 14 Jan 2021 09:50:57 -0500 Subject: [PATCH] Update rbac.md --- content/en/docs/reference/access-authn-authz/rbac.md | 1 + 1 file changed, 1 insertion(+) diff --git a/content/en/docs/reference/access-authn-authz/rbac.md b/content/en/docs/reference/access-authn-authz/rbac.md index 783f25621f..4bc2b86dd6 100644 --- a/content/en/docs/reference/access-authn-authz/rbac.md +++ b/content/en/docs/reference/access-authn-authz/rbac.md @@ -86,6 +86,7 @@ Because ClusterRoles are cluster-scoped, you can also use them to grant access t * cluster-scoped resources (like {{< glossary_tooltip text="nodes" term_id="node" >}}) * non-resource endpoints (like `/healthz`) * namespaced resources (like Pods), across all namespaces + For example: you can use a ClusterRole to allow a particular user to run `kubectl get pods --all-namespaces`